CONCEPT PLANNED BY – CMAI ASSOCIATION CONCEPT DESIGN BY – DR.PVR FACE OF THE CONCEPT – Ms.AVANI MODI SAFE CYBERSPACE MISSION.

Slides:



Advertisements
Similar presentations
How to protect yourself, your computer, and others on the internet
Advertisements

Government Uses and Benefits. Social Communications Specialist Chair, Statewide Social Media
IDENTITY THEFT & CYBER SECURITY WHY ALL EYES ARE ON YOU & WHAT YOU CAN DO ABOUT IT?
It’s more than a game, it’s your life On?. Aims for this Safer Internet Assembly: ‘virtual lives’To create awareness of our ‘virtual lives’ – what does.
Identity Theft consumer.gov. What is identity theft? When someone uses information about you without your permission. The information can be your: – Name.
IDENTITY THEFT By Beaudan S and Tazwaar A. Identity Theft Identity theft is hard to protect against because hackers are getting better and better and.
INTERNET SAFETY.
INTERNET SAFETY FOR STUDENTS
By Ashlee Parton, Kimmy McCoy, & Labdhi Shah
Internet Security Awareness Presenter: Royce Wilkerson.
CSC101 FINAL PROJECT by Sally Fletcher & Nicole Seguin December 11 th, 2003.
Internet Guidelines. Cyberspace Cyberspace is like a big city. libraries, universities, museums, places to have fun, Places to meet people. But, like.
Mobmail is your FREE worldwide UNIQUE id, Professional, Personal, Social, Verified Now find your friends even you just know their mobile number,
INTERNET SAFETY FOR STUDENTS
How To Protect Your Privacy and Avoid Identity Theft Online.
Citadel Security Software Presents Are you Vulnerable? Bill Diamond Senior Security Engineer
COMPUTER CRIME AND TYPES OF CRIME Prepared by: NURUL FATIHAH BT ANAS.
Safeguarding. Your responsibility Your responsibility.
Sectoral Analysis : Mobile Application Industry Submitted By : Sagar Deshmukh Birla Institute of Management Technology (BIMTECH )
Cyber crime on the rise. Recent cyber attacks How it happens? Distributed denial of service Whaling Rootkits Keyloggers Trojan horses Botnets Worms Viruses.
Cyber Crimes.
Simon’s Situation… When Simon lost his wallet, he thought it was a pain. He had over $50 in it, and his driver’s license and bank card. The next day he.
An Insight into the Relationship Between Social Media and the Susceptibility to Malicious Intent Presented by Rebecca Morgan 15/05/2015 >>>>2.
Identity Theft By: Chelsea Thompson. What is identity theft? The crime of obtaining the personal or financial information of another person for the purpose.
Mobile and Cyber Threat Issues The Fifth Annual African Dialogue Consumer Protection Conference Livingstone, Zambia September 2013.
How Gaming will become a Billion $ business in India Siddhartha Roy COO – Hungama Digital Media.
A Step Into The Computer Underground 1 “By Understanding The Enemy We Are Better Prepared To Defend Ourselves”
Suggested grade levels 7-12 Students will explore strategies that promote personal safety when using the texting-based social network, Twitter.
Dangers of the Internet CEL : C O M P U T E R S I N E V E R Y D A Y L I F E CEL 1 Dangers of the Internet Name: ____________________ Class: ________________.
State of Social Media: 2011 Mary Madden, Senior Research Specialist Presented to: U.S. State Department's Bureau of Educational and Cultural Affairs National.
Task 1 Research on any 2 of the following: Online shopping Online banking Web broadcasting Social networking sites Discuss the disadvantages and advantages.
The Risks of Identity Theft IDENTITY THEFT VICTIMS COULD: Have any and all of their financial accounts invaded and emptied Be asked to repay debts they.
Cyber Bullying & How to Safeguard Yourself. What is Cyber Bullying? Cyber bullying is the use of the Internet and other related technologies to harm other.
Identity theft is one of the main problems in cyberspace increasing each year by 500%. Identity theft is when another public citizen/citizens take your.
Internet in 21st Century. We all use web in our daily lives, from our mobiles or computers. However we do not realize how fast internet is getting bigger.
The way to avoid being trap into cyber crime. What is cyber crime? The Department of Justice categorizes computer crime in three ways: 1. The computer.
Cyber Bullying Kristina 5VN. What is Cyber Bullying? Cyber Bullying is when a form of bullying, which is carried out through an internet service such.
Just Because… Chat / Instant Messenging Application Multiple conversations Convenient (Away, Mobile Page, Etc.) Enhance collaboration efforts Simple –
Identity Fraud TODAY YOU WILL... TAKE STEPS TO PROTECT YOURSELF AGAINST FRAUD 1 (C)2012 National Endowment for Financial Education | Lesson 2-5 Identity.
Grants Management Training 200 Cyber Security There are two kinds of people in America today: Those who have experienced a cyber-attack and know it, and.
Personal Safety Online There are many dangers youth face while online, such as: Predators – strangers who may cause harm Cyber bullies Inappropriate websites.
Cyberbullying What does it mean? What can we do?.
LAUSD Responsible Use Policy (RUP) BUL – Attachment A.
IDENTITY THEFT By Deshano Dottery. FASTEST GROWING PROBLEM IN AMERICA Approximatley 15 million victims per year Approximatley 15 million victims per year.
Internet Guidelines. Cyberspace Cyberspace is like a big city. libraries, universities, museums, places to have fun, Places to meet people. But, like.
 Identity theft: When someone steals another identity, usually to obtain credit or other benefits in that person’s name  Phishing: Attempting to acquire.
INTRODUCTION & QUESTIONS.
Protecting Teens Online Practical Steps. Statistics  One in every three teens say they have been a victim of cyber- bullying  One in every two teens.
Introduction We are India's leading directional media marketing company enabling SME discovery. Pioneers in discovery of platforms across B2B,B2C & C2C.
Kender Primary School E-Safety for Parents and Carers *Look at how children use the internet *Raise awareness of eSafety issues *Offer guidance on how.
1 Outline of this module By the end of this module, you will be able to: – Understand what is meant by “identity crime”; – Name the different types of.
Zeus Virus By: Chris Foley. Overview  What is Zeus  What Zeus Did  The FBI investigation  The virus for phones  Removal and detection  Conclusion.
Huawei established its R&D centre in Bangalore and currently employs more than 2000 R&D engineers and has invested approximately USD 300 Million.
Avoiding Frauds and Scams Barbara Martin-Worley Director, Consumer Fraud Protection 18 th Judicial District Attorney’s Office Serving Arapahoe, Douglas,
Employers Employers could check your Facebook. There may be things on there that you might not want them to see, or things that they may see that would.
By Lloyd and Jamie Brought to you by I safe. How to keep from being bullied (online) 1 don’t give out personal info such as passwords, pins, address,
CNP Fraud. Occurs when a fraudster falsifies an application to acquire a credit card using an individual’s personal information. (Eg: postal intercept)
Overview We are living in a technological world and rapidly advancement in all the different fields of science. With the development in the technology.
To Know what Cyber crime is
Discussion – what kind of bullying is taking place in the images
Cyber Security Awareness Workshop
cybercrime Presented to you by : NAMES MATRIC NO
Sissy r. osteen, ph.d., cfp® Oklahoma State University
Best mobile app development company in Madurai
Follow safety rules so that YOU: Avoid getting HURT.
Bethesda Cybersecurity Club
Personal Safety Online
Who am I?. Information Security and You: Identity Theft and Credit Card Encryption.
Founded in 2002, Credit Abuse Resistance Education (CARE) educates high school and college students on the responsible use of credit and other fundamentals.
Presentation transcript:

CONCEPT PLANNED BY – CMAI ASSOCIATION CONCEPT DESIGN BY – DR.PVR FACE OF THE CONCEPT – Ms.AVANI MODI SAFE CYBERSPACE MISSION

Cyber crimes in India is likely to cross 3,00,000 by ASSOCAM As per the study findings, during 2011, 2012, 2013 and 2014 years, a total number of cyber crimes registered were 13,301, 22,060 71,780 and 62,189 (till May). Currently, the cyber crimes in India is nearly around 1,49,254 and may likely to cross the 3,00,000 by 2015 growing at compounded annual growth rate (CAGR) of about 107 per cent. As per the findings, every month nearly 12,456 cases registered in India. CYBER CRIME STATISTICS

Increasing Smartphone sales and usage in India, the number of people falling victim to such crimes is also on the rise. The number of cyber crime victims in India (2012) was 46 million people against the global average of 560 million. During the years 2011, 2012, 2013 and 2014 (till May), a total number of 21,699, 27,605, 28,481, 48,174 Indian websites were hacked by various hacker group spread across worldwide and likely to touch 85,000 by 2015, adds the study. The Smartphone users rarely check for security certificates and download apps (games, music and other software) from third party or unsecured sites. Mobile banking apps store data such as PIN, account number on the phone. So, there is a risk that if the phone is hacked or stolen, then the information is compromised, points out the study. CYBER CRIMES IN SMART PHONES

Credit and debit card fraud cases top the chart of cybercrimes. There has been a six fold increase in such cases over the past three years. According to the data, around 2277 complaints of online banking/credit/debit card fraud have been reported this year, followed by 191 Face book-related complaints (morphed pictures/cyber stalking/cyber bullying). Other major cyber complaints were cheating through mobile (61), hacking of ID (59), abusive/offensive/obscene calls and SMS (55), and others CYBER CRIME STATISTICS

As per the study, Andhra Pradesh, Karnataka and Maharashtra have occupied the top 3 positions when it comes to cyber crimes registered under the new IT Act in India. Interestingly, these three states together contribute more than 70 per cent to India's revenue from IT and IT related industries. CYBER CRIME STATISTICS

Karan Johar became the target of cyber hacking when the hacker apparently started sending messages to all celebs from his social networking account. CELB. ACCOUNT HACKED

Trisha Krishnan became the victim of cyber hacking when her social networking account got hacked by some anonymous hacker. She complained to the crime branch claiming her account account was hacked.

Hansika Motwani was shocked when some hacked her Twitter account. She posted on twitter, "for probably the 5th time my twitter id was hacked AGAIN! been furious since morn. god knows what pleasure ppl get in hacking someone's password ! so shallow n jobless never the less cyber world will take care of the rest:) (sic).

SOME MORE CASES

Calendar Girls is an upcoming 2015 Indian drama film directed by Madhur Bhandarkar and co-produced by Sangeeta Ahir and Bhandarkar Entertainment. The film's Music is by Meet Bros Anjjan & Amaal Malik.The film will be releasing in August. The film focuses on five girls who hail from different regions of India, and who have been selected to pose for the country's most prestigious annual calendar which is a joint effort between business tycoon Rishabh Kukreja and his photographer friend Timmy Sen ABOUT FILM CALENDAR GIRLS

CALENDAR GIRLS N SOCIAL MEDIA

MESSAGE ORIENTED SOCIAL MEDIA

SOCIAL MESSAGE BY CALENDAR GIRLS

SOCIAL MEDIA PROMOTION BY “CALENDAR GIRLS”

SOCIAL MESSAGE BY “CALENDAR GIRLS”

AVANI MODI Ms. AVANI MODI JOINS WITH CMAI FOR SAFE CYBERSPACE MISSION